Analysis

  • max time kernel
    13s
  • max time network
    15s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-09-2021 23:00

General

  • Target

    Loader.bin.exe

  • Size

    6KB

  • MD5

    5c3b3d29900401cf7c8a6f7da0a1d7fa

  • SHA1

    41cf781fed46bf34cbec0a2852c56592297cc7ed

  • SHA256

    fc4590965f4831e8ed0e8465df39ca064d14dfcb79f320bf937ba18807d08f2c

  • SHA512

    ddec58841d1b8c9278802ae310701c89eaf6cf306d21cd0af1b913e54ea524438799c1038f5a3c2b2288b770b46fad785331798b7ee826fb30e5e65965bdceca

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Loader.bin.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 1584
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3276

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3276-115-0x0000000000000000-mapping.dmp

  • memory/4060-114-0x0000000000570000-0x000000000061E000-memory.dmp

    Filesize

    696KB